Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Palo Alto Networks: TRAPS 4.2 - Install, Configure, and Manage

Traps is a prevention protection mechanism designed to prevent advanced persistent threats (APTs) and also zero-day attacks.

GK# 4695 Vendor# PAN-EDU-281

Course Overview

TOP

Palo Alto Networks Traps Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Traps accomplishes this through a highly scalable, lightweight agent that uses an innovative new approach for defeating attacks without requiring any prior knowledge of the threat itself. Successful completion of this two-day, instructor-led course equips you to install traps in basic configurations.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • How Traps protects against exploits and malware-driven attacks
  • Install and configure the Endpoint Security Manager (ESM) and Traps endpoint components
  • Build rules
  • Enable and disable process protections
  • Integrate Traps with Palo Alto Networks WildFire

 

Outline

TOP
Viewing outline for:

Classroom Live Outline

Module 1: Traps Overview

  • How sophisticated attacks work today
  • The design approach of Traps
  • Traps components and resources

Module 2: Installing Traps

  • Planning the installation
  • Installing the ESM Server and Console
  • Installing Windows and macOS agents
  • Managing content updates
  • Upgrading Traps

Module 3: Malicious Software Overview

  • Basics of computer architecture
  • Exploitation techniques and their prevention
  • Malware techniques and their prevention

Module 4: Consoles Overview

  • Introduction to the ESM Console
  • Introduction to the Traps Agent Console

Module 5: Traps Protection Against Exploits

  • Architecture and EPMs
  • Configuring exploit protection

Module 6: Traps Protection Against Malware

  • Malware protection process flow and components
  • Trusted signer management
  • Post-detection malware analysis

Module 7: Prevention Event Exceptions

  • Prevention events
  • Malware/Exploit Protection Module (MPM/EMP) events
  • Execution Restriction events
  • WildFire hash control events
  • Post-Detection events

Module 8: Managing Traps

  • System monitoring
  • Traps Server and Agent license administration
  • Server settings, users, and roles
  • Agent settings and Agent actions

Module 9: Traps Forensics Capabilities

  • Forensics workflow and policies
  • Responding to prevention events, and logging

Module 10: Basic Traps Troubleshooting

  • DIReC methodology and troubleshooting resources
  • Working with the technical support
  • Troubleshooting installation, connectivity, and upgrades

Who Should Attend

TOP
  • Security engineers
  • System administrators
  • Technical support engineers
Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 2 day

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 2 day

Request this course in a different delivery format.
Enroll